Browse Definitions:

Browse File Extensions by Alphabet

FSS - FWV

  • FSS - PaperPort Slide Show file
  • FSS - Splitty Data Split File
  • FSS - File Split Pro file
  • FSS - Micrografx Picture ...
  • FSS - Iomega Backup File ...
  • FSSCRIPT - F# Source Code ( ...
  • FSSD - Sound
  • FST - Linkable program (dBFast)
  • FSVO - Detailer
  • FSX - Data (Lotus 1-2-3)
  • FSX3 - Mac File Type
  • FSY - FileSync profile Header
  • FSY - FileSync Profile ( ...
  • FSY - PhotoFantasy Image image...
  • FSZ - Fractal Zplot Data / ...
  • FT - Full text index (Lotus ...
  • FT10 - Adobe FreeHand 10 ...
  • FT11 - Adobe FreeHand 11 ...
  • FT30 - Mac File Type
  • FT7 - Adobe Freehand 7 ...
  • FT7 - FreeHand 7 Template
  • FT8 - Adobe FreeHand 8 ...
  • FT8 - FreeHand 8 Template
  • FT9 - Adobe FreeHand 9 ...
  • FT9 - Macromedia Freehand ...
  • FTB - Index file (Roots3)
  • FTBL - PIPE -FLO Professional ...
  • FTC - FluxTime Studio Clip ...
  • FTCH - (MAC CREATOR CODE ) ...
  • FTCH - Mac File Type
  • FTF - Client access data ...
  • FTG - Help system full-text ...
  • FTH - FileMaker Pro Theme file
  • FTI - FamiTracker Instrument (...
  • FTIL - e- Hastakshar Contract ...
  • FTK - Formtek Raster Bitmap ...
  • FTL - FreeMarker Template ( ...
  • FTL - Family Tree Legends ...
  • FTL - FutureTense Texture
  • FTL - Future Tense Texture ( ...
  • FTM - Font (MicroGrafx)
  • FTML - Mighty Games World File ...
  • FTMP - Fontmap 3d font map ( ...
  • FTN - FORTRAN Source Code File
  • FTN - Fortran language source ...
  • FTO - Sistemas Administrativos...
  • FTP - File transfer protocol (...
  • FTPL - Simfatic Forms template ...
  • FTPLOC - FTP Location
  • FTR - Description
  • FTR - Sound format ( court ...
  • FTR - Future Document ( ...
  • FTS - Help system full-text ...
  • FTV - Forest & Trees File
  • FTV - Forest & Trees File
  • FTW - Document file (Family ...
  • FTX - Declared Fielded Text - ...
  • FTX - TextCraft Document
  • FTXT - Cloanto C1- Text ...
  • FTXT - IFF- Text document Header
  • FTXT - text - Cloanto text ...
  • FU - F* You Software Key ...
  • FUD - FairUse Wizard Data
  • FUK - POSTAL 2 Map File ( ...
  • FUL - Microsoft Backup File ...
  • FUL - Full Foram Count File
  • FULL - Cygwin Variable Log File
  • FULL - Cygwin var log file
  • FUN - Unknown Apple II File
  • FUN - Koolmoves File
  • FUN - Description ( Functions ...
  • FUN - Project FUN Editor Game ...
  • FUP - FairUse Wizard Project
  • FUS - Fxpansion Uninstall ...
  • FUS - GURU uninstall script
  • FUSUC - Final Uninstaller ...
  • FUZZAK - Fuzzac Packer format
  • FUZZY - Fuzzy Logic File
  • FVANIM - Powerbullet Presenter ...
  • FVF - Fluke View
  • FVF - Fluke View file format
  • FVI - Unknown Video file format
  • FVML - formVista Document ( ...
  • FVPL - Frozen Vertex Pair List ...
  • FVS - Forest Vegetation ...
  • FVT - Fast Search & Transfer ...
  • FW - Database (Framework II)
  • FW2 - Database (Framework II)
  • FW3 - Database (Framework III)
  • FW4 - Database (Framework IV)
  • FWB - Data file backup for ...
  • FWBS - FWB SCSI Configure
  • FWD - IMail Server Forwarded ...
  • FWEB - Fortran WEB
  • FWI - PhotoSmart 850 Digital ...
  • FWK - FrameWork Database
  • FWK - Colton Software ...
  • FWL - FileWrangler EXE Library
  • FWP - Microsoft FrontPage Web ...
  • FWRT - (MAC CREATOR CODE ) ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close